About Rafeeq Rehman
Consultant, Author, Researcher.
While many people and organizations have been praised for their philanthropic work and poverty alleviation, the open source movement does not get the credit it deserves. I would argue that no other work comes even close to what the open … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
There are many reasons that make Secure Access Service Edge (SASE) an appealing concept. Major among these are moving from corporate data centers to the Cloud, need to work from anywhere, reducing complexity, and use of applications delivered as SaaS. … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
NOTE: A new version of CISO MindMap (2022) is available at this URL. Most people outside the Cybersecurity profession don’t fully realize and appreciate the complexity of security professionals’ job. I have been publishing and updating this MindMap for almost … Continue reading →
Like this:
Like Loading...
What is it? Secure Access Service Edge or SASE is a relatively new concept. The goal is to connect users from anywhere to applications, data and services hosted in any place (Cloud, corporate data centers or Software-as-a-Service platforms). The basic … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
There is a lot going on with Cloud computing, containers and micro services. Following is a summary of what information security professionals need to know about one very important idea: the Service Mesh. What is it? Service Mesh controls, monitors, … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
The PDF version of my latest book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is now available for download. You can share this link, print it, and use it … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
There are few things that every architect should do but most forget. As you know, there is no shortage of technology architecture frameworks and standards. You may have come across TOGAF for enterprise architecture and SABSA (Sherwood Applied Business Security … Continue reading →
Like this:
Like Loading...
My latest book “Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is published and available on amazon.com worldwide. This is a relatively short book with 11 chapters, three sections and about … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
The final draft of “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” book is complete and is available for download and your comments. The book consists of ten chapters as … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
Over years of my professional work and research, I found six ingredients absolutely necessary for success of any SOC, big or small. When you combine these ingredients with continuous improvement activities, you will get excellent business results. On the other … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...